Visible to the public An Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks

TitleAn Anonymous Routing Scheme for Preserving Location Privacy in Wireless Sensor Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsZhou, Liming, Shan, Yingzi, Chen, Xiaopan
Conference Name2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)
ISBN Number978-1-5386-6243-4
Keywordsanonymous routing, anonymous routing strategy for preserving location privacy, ARPLP, base station, Base stations, communication delay, compositionality, control theory, cryptography theory, Cyber physical system, cyber physical systems, data privacy, energy consumption, Energy efficiency, Human Behavior, location information, location privacy, Location Privacy in Wireless Networks, location security, Metrics, privacy, proxy source node, pubcrawl, Receivers, resilience, Resiliency, Routing, routing branch, Scalability, security, synchronisation, telecommunication network routing, telecommunication security, telecommunication traffic, traffic consumption, Wireless sensor networks
Abstract

Wireless sensor networks consist of various sensors that are deployed to monitor the physical world. And many existing security schemes use traditional cryptography theory to protect message content and contextual information. However, we are concerned about location security of nodes. In this paper, we propose an anonymous routing strategy for preserving location privacy (ARPLP), which sets a proxy source node to hide the location of real source node. And the real source node randomly selects several neighbors as receivers until the packets are transmitted to the proxy source. And the proxy source is randomly selected so that the adversary finds it difficult to obtain the location information of the real source node. Meanwhile, our scheme sets a branch area around the sink, which can disturb the adversary by increasing the routing branch. According to the analysis and simulation experiments, our scheme can reduce traffic consumption and communication delay, and improve the security of source node and base station.

URLhttps://ieeexplore.ieee.org/document/8728980
DOI10.1109/ITNEC.2019.8728980
Citation Keyzhou_anonymous_2019